Hi Javed,

 

I think you’re getting something wrong.

 

Policies aren’t there so APNIC can verify “everything” to “every” member. This 
will be impossible.

 

Policies are there so everybody know the rules, and try their best to avoid 
breaking them.

 

Policies are there to avoid bad-intentions from bad-Internet actors, in order 
to protect the majority (the good ones).

 

If we only accept policies when they can be verified, then we will have an 
empty policy book :-)

 

If APNIC does a verification, for whatever reason (any suspicius, a claim from 
another member, etc.), and a rule is broken, APNIC should take measures if the 
member doesn’t correct it. In some cases those measures may mean member 
closure, resource recovery, etc. This is a completely different discussion 
which has policy and service agreement implications.

 

Please, note before continue reading that this only affects end-user direct 
assignments by APNIC or the NIRs. Not clarifiying this caused some confusion in 
the discussion of the last meeting. So if you’re an ISP (I’m not sure if that’s 
your case), this proposal doesn’t affect you.

 

It only affect you, if you are getting a direct assignment from APNIC or any of 
the NIRs.

 

The fact here is that if, for example, an university, which got a direct 
assignment from APNIC, is providing the students public addresses (IPv4) or 
global addresses (IPv6), it is against the policy.

 

In the case of IPv4, the solution is easy, use NAT and private addresses (but 
not all the universities do that). However in IPv6 this is not the solution, we 
don’t have NAT.

 

I can put many other similar examples (remember again, this is only the case 
when the addresses are directly assigned to the end-user by APNIC or the NIR, 
not by an ISP): a point to point link from the university to another network, 
an employee getting addresses from a company, thir party companies offering 
services to that company or university, a municipality offering WiFi to 
citizens, etc.

 

The proposal solves both cases, the IPv4 and the IPv6 one.

 

Note that this has been already corrected in all the other RIRs (ARIN, AFRINIC, 
LACNIC and RIPE). All them had the same problem in their policy text.

 

Regards,

Jordi

@jordipalet

 

 

 

El 23/8/19 16:01, "Javed Khan" <sig-policy-boun...@lists.apnic.net en nombre de 
javedkha...@outlook.com> escribió:

 

I do not support this proposal. Intention is good but no one is really 
concerned nor can verify this in practice. I think the current policy text is 
good.

 

Kind regards

Javed Khan

MSCE and CCSP

 

From: sig-policy-boun...@lists.apnic.net <sig-policy-boun...@lists.apnic.net> 
on behalf of Sumon Ahmed Sabir <sasa...@gmail.com>
Sent: Saturday, 10 August 2019 10:33 PM
To: Policy SIG <sig-pol...@apnic.net>
Subject: [sig-policy] prop-124-v006: Clarification on Sub-Assignments 

 

Dear SIG members

A new version of the proposal "prop-124: Clarification on Sub-Assignments"
has been sent to the Policy SIG for review.

It will be presented at the Open Policy Meeting at APNIC 48 in
Chiang Mai, Thailand on Thursday, 12 September 2019.

Information about earlier versions is available from:
https://www.apnic.net/community/policy/proposals/prop-124

You are encouraged to express your views on the proposal:

  - Do you support or oppose the proposal?
  - Is there anything in the proposal that is not clear?
  - What changes could be made to this proposal to make it more effective?

Please find the text of the proposal below.

Kind Regards,

Sumon, Bertrand, Ching-Heng
APNIC Policy SIG Chairs


----------------------------------------------------------------------

prop-124-v006: Clarification on Sub-Assignments

----------------------------------------------------------------------

Proposer: Jordi Palet Martínez
           jordi.pa...@theipv6company.com


1. Problem Statement
--------------------

Note that this proposal is ONLY relevant when end-users obtain direct 
assignments
from APNIC, or when a LIR obtains, also from APNIC, and assignment for 
exclusive
use within its infrastructure. Consequently this is NOT relevant in case 
of LIR
allocations.

When the policy was drafted, the concept of assignments/sub-assignments 
did not
consider a practice very common in IPv4 which is replicated and even 
amplified
in IPv6: the use of IP addresses for point-to-point links or VPNs.

In IPv4, typically, this is not a problem if NAT is being used, because 
the assigned
addresses are only for the WAN link, which is part of the infrastructure 
or interconnection.

In the case of IPv6, instead of unique addresses, the use of unique 
prefixes
(/64) is increasingly common.

Likewise, the policy failed to consider the use of IP addresses in 
hotspots hotspots
(when is not an ISP, for example, associations or community networks), 
or the use of
IP addresses by guests or employees in Bring Your Own Device (BYOD) and 
many other
similar cases.

One more case is when an end-user contracts a third-party to do some 
services in their
own network and they need to deploy their own devices, even servers, 
network equipment,
etc. For example, security surveillance services may require that the 
contractor provides
their own cameras, recording system, even their own firewall and/or 
router for a dedicated
VPN, etc. Of course, in many cases, this surveillance system may need to 
use the addressing
space of the end-user.

Finally, the IETF has recently approved the use of a unique /64 prefix 
per interface/host
(RFC8273) instead of a unique address. This, for example, allows users 
to connect to a hotspot,
receive a /64 such that they are “isolated” from other users (for 
reasons of security,
regulatory requirements, etc.) and they can also use multiple virtual 
machines on their
devices with a unique address for each one (within the same /64).


2. Objective of policy change
-----------------------------

Section 2.2.3. (Definitions/Assigned Address Space), explicitly 
prohibits such assignments,
stating that “Assigned ... may not be sub-assigned”.

It also clarifies that the usage of sub-assignments in ISPs, data 
centers and similar cases
is not allowed, according to the existing practices of APNIC.


3. Situation in other regions
-----------------------------

This situation, has already been corrected in AFRINIC, ARIN, LACNIC and 
RIPE.


4. Proposed policy solution
---------------------------

Current Text
2.2.3. Assigned address space
Assigned address space is address space that is delegated to an LIR, or 
end-user,
for specific use within the Internet infrastructure they operate. 
Assignments must
only be made for specific, documented purposes and may not be sub-assigned.


New text:
2.2.3. Assigned address space
Assigned address space is address space that is delegated to an LIR, or 
end-user,
for exclusive use within the infrastructure they operate, as well as for 
interconnection
purposes.

The assigned address space must only be used by the original recipient 
of the assignment,
as well as for third party devices provided they are operating within 
said infrastructure.

Therefore, sub-assignments to third parties outside said infrastructure 
(for example
using sub-assignments for ISP customers), and providing addressing space 
to third
parties in data-centers (or similar cases), are not allowed.


5. Advantages / Disadvantages
-----------------------------

Advantages:
Fulfilling the objective above indicated and making sure to match the 
real situation
in the market.


Disadvantages:
None foreseen.


6. Impact on resource holders
-----------------------------
None.

7. References
-------------
Links to RIPE policy amended and new policy proposal submitted.

* sig-policy: APNIC SIG on resource management policy * 
_______________________________________________ sig-policy mailing list 
sig-policy@lists.apnic.net https://mailman.apnic.net/mailman/listinfo/sig-policy



**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the exclusive use of the 
individual(s) named above and further non-explicilty authorized disclosure, 
copying, distribution or use of the contents of this information, even if 
partially, including attached files, is strictly prohibited and will be 
considered a criminal offense. If you are not the intended recipient be aware 
that any disclosure, copying, distribution or use of the contents of this 
information, even if partially, including attached files, is strictly 
prohibited, will be considered a criminal offense, so you must reply to the 
original sender to inform about this communication and delete it.

*              sig-policy:  APNIC SIG on resource management policy           *
_______________________________________________
sig-policy mailing list
sig-policy@lists.apnic.net
https://mailman.apnic.net/mailman/listinfo/sig-policy

Reply via email to